Secdo Partners with ePlus for Automated Endpoint Security, Incident Response

October 4, 2017

3 Min Read

PRESS RELEASE

NEW YORK, NY— (October 4, 2017) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced a new partnership with consultative technology solutions provider, ePlus (Nasdaq: PLUS). Under the terms of this new partnership, ePlus is expanding the company’s growing IT security business with Secdo’s Automated Endpoint Security and Incident Response software. Through the partnership, Secdo solutions are now generally available to the company’s global customer base for the continuous monitoring, automated response, surgical remediation, and preemptive defense of endpoints against emerging threats.

According to a study by the Enterprise Strategy Group, “58% of information security professionals say that they would prefer to address their strategic endpoint security requirements with an integrated product suite from a single vendor.”[ Enterprise Strategy Group, Massive Enterprise Endpoint Security Opportunity, https://www.csoonline.com/article/2900306/cisco-subnet/massive-enterprise-endpoint-security-opportunity.html] Secdo is an agile endpoint security and incident response provider with a multi-faceted solution to counter and respond to today’s threat landscape. Deployment models of the Secdo platform are flexible, allowing the technology to be deployed on-premise or in the cloud.

“Organizations around the world are under significant pressure to safeguard computing assets as the IT landscape and environment for potential malware and other attacks has grown,” said Lee Waskevich, vice president at ePlus. “Secdo technology helps to automate common analyst tasks and can leverage investments in SIEM and other security operations technologies to provide significant reduction in the triage of incident handling as well as remediation without business interruption. Secdo complements the work ePlus performs in helping to build robust security programs for our customers as it provides reduction in security event noise and aids in addressing the security talent shortage through automation. We are pleased to offer our customers a more accurate and defensive approach to endpoint security.”

Secdo transforms the security workflow from reactive to proactive, thereby allowing incident response teams to address alerts and threats quickly and precisely. With a focus on supporting a global partner ecosystem, Secdo aligns with strategic solution providers, resellers, consulting firms, advisories, MSPs, MSSPs, MDRs, and other types of technology and service providers to deliver prompt, local support from leading experts in the field of IT security and compliance.

“Through both simple tactics and complex algorithms, cyber criminals determined to achieve their mission are accomplishing unprecedented results by attacking computing endpoints at every level. This deluge is overwhelming security teams with thousands of alerts daily, allowing real alerts to go unnoticed,” said Zion Zatlavi, VP, Alliances for Secdo. “We have set a new standard by replacing traditional, post-attack approaches with a thread-level proactive solution that monitors and defends every server and endpoint without manual intervention. Secdo complements the ePlus IT security solution portfolio for a more robust approach to endpoint security and incident response.”

Secdo Automated Endpoint Security and Incident Response
Security teams are overwhelmed with thousands of alerts daily, resulting in real threats getting overlooked. Investigating an alert is a laborious process that can take days or months. Even when a real breach is detected, response is tedious, imprecise, and can take weeks. Secdo modernizes endpoint security with the steady collection of all activities and actions from computers and servers at the thread level—the most granular view possible into activity on endpoints. The core of Secdo’s approach is the Causality Analysis Engine™, which continuously and automatically analyzes billions of historical endpoint transactions to identify the chain of events associated with any sub-process, host, user, connection or file, and the causality chain behind every threat, down to their root cause. The solution then provides advanced remediation techniques and allows security analysts to optimize the platform for the prevention of future incidents.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights